"In general, networks should be configured to deny access to websites such
as www.torproject.org"

Blocking Tor exit nodes is one thing, but this is just bizarre. They could
make a claim that privacy from your boss is something they wish to prevent,
but I saw no such claim.

On Thu, 27 Aug 2015 at 14:19 CJ <t...@tengu.ch> wrote:

>
>
> On 08/27/2015 12:51 AM, grarpamp wrote:
> >
> http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN.PDF
> >
> > IBM Advises Businesses To Block Tor
> >
> > With Tor-based attacks on the rise, IBM says it's time to stop Tor in
> > the enterprise.
> >
> > New data from IBM's X-Force research team shows steady increase in SQL
> > injection and distributed denial-of-service attacks as well as
> > vulnerability reconnaissance activity via the Tor anonymizing service.
> >
>
> Well, that's why my exit nodes was, until recently, opened only to
> HTTP/HTTPS… Now I've pushed a more opened policy but got abuse mails
> from my hosting service the next hours… until I locked down SSH port.
>
> People using Tor for "bad things" just don't realize how they fuck up
> the whole thing. Not even mentioning "weird contents", just the script
> kiddies running metasploit/other through Tor.
>
> Hopefully I'll be able to keep my exit up with the current configuration…
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to